000 04340nam a22006255i 4500
001 978-3-030-35869-3
003 DE-He213
005 20240730171514.0
007 cr nn 008mamaa
008 191120s2019 sz | s |||| 0|eng d
020 _a9783030358693
_9978-3-030-35869-3
024 7 _a10.1007/978-3-030-35869-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity, Privacy, and Applied Cryptography Engineering
_h[electronic resource] :
_b9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings /
_cedited by Shivam Bhasin, Avi Mendelson, Mridul Nandi.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aX, 237 p. 106 illus., 42 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v11947
505 0 _aDeployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security -- Real Processing-in-Memory with Memristive Memory Processing Unit -- Length Preserving Symmetric Encryption: Is it Important? -- Towards Automatic Application of Side Channel Countermeasures -- Challenges in Deep Learning-based Profiled Side-channel Analysis -- A Study of Persistent Fault Analysis -- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT -- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security -- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA -- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128 -- Automated Classification of Web-Application Attacks for Intrusion Detection -- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions -- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch -- Encrypted Classification Using Secure K-Nearest Neighbour Computation -- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices -- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
520 _aThis book constitutes the refereed proceedings of the 9th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2019, held in Gandhinagar, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 24 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.
650 0 _aData protection.
_97245
650 0 _aSoftware engineering.
_94138
650 0 _aComputers.
_98172
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 1 4 _aData and Information Security.
_931990
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aComputer Hardware.
_933420
650 2 4 _aComputer Engineering and Networks.
_998941
700 1 _aBhasin, Shivam.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_998944
700 1 _aMendelson, Avi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_998945
700 1 _aNandi, Mridul.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_998947
710 2 _aSpringerLink (Online service)
_998951
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030358686
776 0 8 _iPrinted edition:
_z9783030358709
830 0 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v11947
_998953
856 4 0 _uhttps://doi.org/10.1007/978-3-030-35869-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c87633
_d87633